"nested JWTs" are only nominally defined in draft-ietf-oauth-json-web-token-05 (and the term is missing from the terminology section).

the JWT spec implies that "signing and then encrypting" and "encrypting and then signing" are equivalent. however they aren't in various ways.

Axel already raised this point in..

  Re: [jose] encrypting AND signing a token
  https://www.ietf.org/mail-archive/web/jose/current/msg01269.html

..and cited this paper (worth citing again)..

  Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
  Don Davis
  http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html

http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.28.7379&rep=rep1&type=pdf


One has to carefully compose signing and encryption in order to avoid various vulnerabilities detailed in the latter.

I agree with Axel that there should be one carefully designed way to craft a signed and encrypted JW*.

Note that in the JSMS draft (draft-rescorla-jsms-00; an early input into what became the JOSE WG), sign & encrypt composition is declared..

> 4.6.  Composition
>
>    This document does not specify a combination signed and encrypted
>    mode.  However, because the contents of a message can be arbitrary,
>    and encryption and data origin authentication can be provided by
>    recursively encapsulating multiple JSMS messages.  In general,
>    senders SHOULD sign the message and then encrypt the result (thus
>    encrypting the signature).  This prevents attacks in which the
>    signature is stripped, leaving just an encrypted message, as well as
>    providing privacy for the signer.

..tho that's a drafty draft and I didn't review carefully enough to determine whether it addresses the need for sign and encrypt to cross-refer (see S4.3 in the paper).


HTH,

=JeffH



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to